Posted by Oscar Friedman in Business
on Feb 14th, 2018 | Comments Off on Best Practice for Lifecycle Crypto Key Management

Organisations utilising cryptography for securing confidential information have the choice of hardware and software based solutions depending on the nature of the data in need of encryption. Arguably, the weakest link in the chain is the cryptographic keys used to encrypt and decrypt the data. This is due to the constantly increasing processing power of today’s computers and the length of time it may take to compromise the keys through an exhaustive key search. Therefore, these organisations must regularly revoke, update and distribute the keys to the relevant parties in order to reduce the risk of internal and external threats.

Many sectors, including banking and governmental, have the time consuming task of tracking and managing ever-increasing numbers of keys to ensure the right keys are in the right place at the right time. The vast amounts of keys needed for the daily operations of applications using crypto will lead to an army of administrators if the keys are managed manually. Hence, automated key management systems are now a necessity for these organisations if they are to keep on top of the workload, and reduce their admin costs.

Key management will come in many variations with some more suitable for enterprise settings while others are more scalable, designed for the huge numbers of keys as utilised in the banking industry. Different requirements need different solutions; however, there are some general issues which must be addressed if the implementation of such systems is to be successful in terms of functionality, compliance, availability and keeping costs at a minimum. A short list of best practice procedures is below: De-centralize encryption and decryption,Centralized lifecycle key management , Automated key distribution and updating. Future proof – supporting multiple standards, e.g. PCI DSS, Sarbanes-Oxley and FIPS 140-2 , support for all major hardware and software security modules to avoid vendor tie-in, flexible key attributes to eliminate paperwork, comprehensive searchable tamper evident audit logs, transparent and streamlined processes, base on open standards to Minimise development time when integrating new applications

With a system combining these elements, key management can eliminate many of the risks associated with human error and intentional attacks on the confidential data. It may also allow the flexibility for providing security for applications which might otherwise have been deemed too costly for cryptography.